near / mpc

37 stars 11 forks source link

fix: protocol too fast and spamming messages #522

Closed ChaoticTempest closed 6 months ago

ChaoticTempest commented 6 months ago

This fixes the offline test from failing over too easily due to recent changes. This also makes certain messages less likely to spam due to how fast the protocol is going.

Note that I change from having a non-existent sleep to a 100ms sleep for running state, since the difference in performance is very negligible due to how long the node needs to wait for incoming messages to be processed for running state anyways.

github-actions[bot] commented 6 months ago

Terraform Feature Environment (dev-522)

Terraform Initialization ⚙️success

Terraform Apply success

Show Apply Plan ``` data.external.git_checkout: Reading... data.external.git_checkout: Read complete after 0s [id=-] data.google_compute_network.prod_network: Reading... data.google_compute_subnetwork.prod_subnetwork: Reading... data.google_compute_network.dev_network: Reading... data.google_compute_subnetwork.dev_subnetwork: Reading... data.google_compute_network.dev_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/dev] data.google_compute_network.prod_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/prod] data.google_compute_subnetwork.dev_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-dev-us-east1] data.google_compute_subnetwork.prod_subnetwork: Read complete after 1s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-prod-us-east1] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # google_project_iam_member.service-account-datastore-user will be created + resource "google_project_iam_member" "service-account-datastore-user" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = "pagoda-discovery-platform-dev" + role = "roles/datastore.user" } # google_secret_manager_secret_iam_member.account_creator_secret_access will be created + resource "google_secret_manager_secret_iam_member" "account_creator_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-recovery-account-creator-sk-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[0] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-0-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[1] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-1-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[2] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-2-dev" } # google_secret_manager_secret_iam_member.fast_auth_partners_secret_access will be created + resource "google_secret_manager_secret_iam_member" "fast_auth_partners_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-fast-auth-partners-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[0] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-0-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[1] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-1-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[2] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-2-dev" } # google_service_account.service_account will be created + resource "google_service_account" "service_account" { + account_id = "mpc-recovery-dev-522" + disabled = false + display_name = "MPC Recovery dev-522 Account" + email = (known after apply) + id = (known after apply) + member = (known after apply) + name = (known after apply) + project = (known after apply) + unique_id = (known after apply) } # google_service_account_iam_binding.serivce-account-iam will be created + resource "google_service_account_iam_binding" "serivce-account-iam" { + etag = (known after apply) + id = (known after apply) + members = [ + "serviceAccount:mpc-recovery@pagoda-discovery-platform-dev.iam.gserviceaccount.com", ] + role = "roles/iam.serviceAccountUser" + service_account_id = (known after apply) } # module.leader.google_cloud_run_v2_service.leader will be created + resource "google_cloud_run_v2_service" "leader" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-leader-dev-522" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-leader", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_SIGN_NODES" + value = (known after apply) } + env { + name = "MPC_RECOVERY_NEAR_RPC" + value = "https://rpc.testnet.near.org" } + env { + name = "MPC_RECOVERY_NEAR_ROOT_ACCOUNT" + value = "testnet" } + env { + name = "MPC_RECOVERY_ACCOUNT_CREATOR_ID" + value = "mpc-recovery-dev-creator.testnet" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-522" } + env { + name = "MPC_RECOVERY_ACCOUNT_CREATOR_SK" + value_source { + secret_key_ref { + secret = "mpc-recovery-account-creator-sk-dev" + version = "latest" } } } + env { + name = "FAST_AUTH_PARTNERS" + value_source { + secret_key_ref { + secret = "mpc-fast-auth-partners-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "MPC_RECOVERY_OTLP_ENDPOINT" + value = "https://otel.dev.api.pagoda.co:443/v1/traces" } + env { + name = "MPC_RECOVERY_OPENTELEMETRY_LEVEL" + value = "debug" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.leader.google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-leader-dev-522" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[0].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-0-dev-522" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "0" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-522" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-0-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-0-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[0].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-0-dev-522" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[1].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-1-dev-522" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "1" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-522" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-1-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-1-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[1].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-1-dev-522" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[2].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-2-dev-522" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "2" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-522" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-2-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-2-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[2].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-2-dev-522" + project = (known after apply) + role = "roles/run.invoker" } Plan: 19 to add, 0 to change, 0 to destroy. Changes to Outputs: + leader_node = (known after apply) google_service_account.service_account: Creating... google_service_account.service_account: Creation complete after 1s [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Creating... google_project_iam_member.service-account-datastore-user: Creating... google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Creating... google_secret_manager_secret_iam_member.account_creator_secret_access: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Creating... google_service_account_iam_binding.serivce-account-iam: Creating... google_service_account_iam_binding.serivce-account-iam: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.account_creator_secret_access: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[0].google_cloud_run_v2_service.signer: Creating... module.signer[1].google_cloud_run_v2_service.signer: Creating... module.signer[2].google_cloud_run_v2_service.signer: Creating... google_project_iam_member.service-account-datastore-user: Creation complete after 8s [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[0].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[2].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[1].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522/roles/run.invoker/allUsers] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522/roles/run.invoker/allUsers] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522/roles/run.invoker/allUsers] module.leader.google_cloud_run_v2_service.leader: Creating... module.leader.google_cloud_run_v2_service.leader: Still creating... [10s elapsed] module.leader.google_cloud_run_v2_service.leader: Still creating... [20s elapsed] module.leader.google_cloud_run_v2_service.leader: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Creating... module.leader.google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522/roles/run.invoker/allUsers] Apply complete! Resources: 19 added, 0 changed, 0 destroyed. Outputs: leader_node = "https://mpc-recovery-leader-dev-522-7tk2cmmtcq-ue.a.run.app" ```

Pusher: @ChaoticTempest, Action: pull_request, Working Directory: `, Workflow:Terraform Feature Env`

URL: https://mpc-recovery-leader-dev-522-7tk2cmmtcq-ue.a.run.app

github-actions[bot] commented 6 months ago

Terraform Feature Environment Destroy (dev-522)

Terraform Initialization ⚙️success

Terraform Destroy success

Show Destroy Plan ``` data.external.git_checkout: Reading... data.external.git_checkout: Read complete after 0s [id=-] data.google_compute_subnetwork.prod_subnetwork: Reading... data.google_compute_network.dev_network: Reading... data.google_compute_network.prod_network: Reading... google_service_account.service_account: Refreshing state... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.dev_subnetwork: Reading... google_secret_manager_secret_iam_member.account_creator_secret_access: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account_iam_binding.serivce-account-iam: Refreshing state... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_network.dev_network: Read complete after 1s [id=projects/pagoda-shared-infrastructure/global/networks/dev] google_project_iam_member.service-account-datastore-user: Refreshing state... [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_network.prod_network: Read complete after 1s [id=projects/pagoda-shared-infrastructure/global/networks/prod] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.prod_subnetwork: Read complete after 1s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-prod-us-east1] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.dev_subnetwork: Read complete after 1s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-dev-us-east1] module.signer[2].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522] module.signer[1].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522] module.signer[0].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522/roles/run.invoker/allUsers] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522/roles/run.invoker/allUsers] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522/roles/run.invoker/allUsers] module.leader.google_cloud_run_v2_service.leader: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522/roles/run.invoker/allUsers] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: - destroy Terraform will perform the following actions: # google_project_iam_member.service-account-datastore-user will be destroyed - resource "google_project_iam_member" "service-account-datastore-user" { - etag = "BwYUhtvcKxQ=" -> null - id = "pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/datastore.user" -> null } # google_secret_manager_secret_iam_member.account_creator_secret_access will be destroyed - resource "google_secret_manager_secret_iam_member" "account_creator_secret_access" { - etag = "BwYUhtuh6gA=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[0] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYUhtuhv+M=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[1] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYUhtuil4U=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[2] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYUhtuiTPk=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev" -> null } # google_secret_manager_secret_iam_member.fast_auth_partners_secret_access will be destroyed - resource "google_secret_manager_secret_iam_member" "fast_auth_partners_secret_access" { - etag = "BwYUhtuh43A=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[0] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYUhtuiioY=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[1] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYUhtujUEY=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[2] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYUhtuilig=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev" -> null } # google_service_account.service_account will be destroyed - resource "google_service_account" "service_account" { - account_id = "mpc-recovery-dev-522" -> null - disabled = false -> null - display_name = "MPC Recovery dev-522 Account" -> null - email = "mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - name = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - unique_id = "113249491381051279828" -> null } # google_service_account_iam_binding.serivce-account-iam will be destroyed - resource "google_service_account_iam_binding" "serivce-account-iam" { - etag = "BwYUhjuJWAM=" -> null - id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser" -> null - members = [ - "serviceAccount:mpc-recovery@pagoda-discovery-platform-dev.iam.gserviceaccount.com", ] -> null - role = "roles/iam.serviceAccountUser" -> null - service_account_id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null } # module.leader.google_cloud_run_v2_service.leader will be destroyed - resource "google_cloud_run_v2_service" "leader" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:58.394832Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:47.388523Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CMfKiLAGEID6y44B/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1sZWFkZXItZGV2LTUyMg\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522/revisions/mpc-recovery-leader-dev-522-00001-dvz" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522/revisions/mpc-recovery-leader-dev-522-00001-dvz" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-leader-dev-522" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:58.434883Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "ae4c488f-993b-4953-a745-dcb6506d72a6" -> null - uri = "https://mpc-recovery-leader-dev-522-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-leader", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_SIGN_NODES" -> null - value = "https://mpc-recovery-signer-0-dev-522-7tk2cmmtcq-ue.a.run.app,https://mpc-recovery-signer-1-dev-522-7tk2cmmtcq-ue.a.run.app,https://mpc-recovery-signer-2-dev-522-7tk2cmmtcq-ue.a.run.app" -> null } - env { - name = "MPC_RECOVERY_NEAR_RPC" -> null - value = "https://rpc.testnet.near.org" -> null } - env { - name = "MPC_RECOVERY_NEAR_ROOT_ACCOUNT" -> null - value = "testnet" -> null } - env { - name = "MPC_RECOVERY_ACCOUNT_CREATOR_ID" -> null - value = "mpc-recovery-dev-creator.testnet" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-522" -> null } - env { - name = "MPC_RECOVERY_ACCOUNT_CREATOR_SK" -> null - value_source { - secret_key_ref { - secret = "mpc-recovery-account-creator-sk-dev" -> null - version = "latest" -> null } } } - env { - name = "FAST_AUTH_PARTNERS" -> null - value_source { - secret_key_ref { - secret = "mpc-fast-auth-partners-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "MPC_RECOVERY_OTLP_ENDPOINT" -> null - value = "https://otel.dev.api.pagoda.co:443/v1/traces" -> null } - env { - name = "MPC_RECOVERY_OPENTELEMETRY_LEVEL" -> null - value = "debug" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.leader.google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYUhj6TfMI=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[0].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:34.136826Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:22.087251Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CK3KiLAGEMj8tcQD/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMC1kZXYtNTIy\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522/revisions/mpc-recovery-signer-0-dev-522-00001-ntd" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522/revisions/mpc-recovery-signer-0-dev-522-00001-ntd" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-0-dev-522" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:34.183264Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "a8294731-789b-47b0-92d6-4c6f98bd0a97" -> null - uri = "https://mpc-recovery-signer-0-dev-522-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "0" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-522" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-0-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-0-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[0].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYUhj0WRto=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[1].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:33.367249Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:22.101280Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CK3KiLAGEJid2sQD/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMS1kZXYtNTIy\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522/revisions/mpc-recovery-signer-1-dev-522-00001-dsf" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522/revisions/mpc-recovery-signer-1-dev-522-00001-dsf" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-1-dev-522" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:33.412119Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "5593b68b-db56-459e-b3fd-11cbb8ca95d5" -> null - uri = "https://mpc-recovery-signer-1-dev-522-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "1" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-522" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-1-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-1-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[1].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYUhj0UF4U=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[2].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:33.611583Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:22.083255Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CK3KiLAGEMjPuMgD/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMi1kZXYtNTIy\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522/revisions/mpc-recovery-signer-2-dev-522-00001-ws8" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522/revisions/mpc-recovery-signer-2-dev-522-00001-ws8" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-2-dev-522" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-26T01:30:33.656027Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "3db51281-d018-4478-9556-b7fe13c08e86" -> null - uri = "https://mpc-recovery-signer-2-dev-522-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:d1ed62807afe26d9e80e5389a757c087ee16cd3e" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "2" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-522" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-2-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-2-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[2].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYUhj0V08o=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } Plan: 0 to add, 0 to change, 19 to destroy. Changes to Outputs: - leader_node = "https://mpc-recovery-leader-dev-522-7tk2cmmtcq-ue.a.run.app" -> null google_project_iam_member.service-account-datastore-user: Destroying... [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account_iam_binding.serivce-account-iam: Destroying... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522/roles/run.invoker/allUsers] google_service_account_iam_binding.serivce-account-iam: Destruction complete after 4s module.leader.google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 5s module.leader.google_cloud_run_v2_service.leader: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-522] google_project_iam_member.service-account-datastore-user: Destruction complete after 8s module.leader.google_cloud_run_v2_service.leader: Still destroying... [id=projects/pagoda-discovery-platform-dev/...1/services/mpc-recovery-leader-dev-522, 10s elapsed] module.leader.google_cloud_run_v2_service.leader: Destruction complete after 11s module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522/roles/run.invoker/allUsers] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522/roles/run.invoker/allUsers] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.account_creator_secret_access: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522/roles/run.invoker/allUsers] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 4s module.signer[1].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-522] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Destruction complete after 4s module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 4s module.signer[2].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-522] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 4s module.signer[0].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-522] google_secret_manager_secret_iam_member.account_creator_secret_access: Destruction complete after 4s module.signer[1].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-1-dev-522, 10s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-2-dev-522, 10s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-0-dev-522, 10s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Destruction complete after 10s module.signer[1].google_cloud_run_v2_service.signer: Destruction complete after 10s module.signer[0].google_cloud_run_v2_service.signer: Destruction complete after 11s google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Destruction complete after 4s google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Destruction complete after 4s google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Destruction complete after 4s google_service_account.service_account: Destroying... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-522@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account.service_account: Destruction complete after 0s Destroy complete! Resources: 19 destroyed. ```

Pusher: @volovyks, Action: pull_request, Working Directory: `, Workflow:Terraform Feature Env (Destroy)`